Publications by ICCRC Members
Academic Publications:
- Szigeti, Á., Frank, R., & Kiss, T. (2023). Trust Factors in the Social Figuration of Online Drug Trafficking: A Qualitative Content Analysis on a Darknet Market. Journal of Contemporary Criminal Justice, 39(2), 167–184. https://doi.org/10.1177/10439862231159996
- Scrivens, R., Wojciechowski, T. W., Freilich, J. D., Chermak, S. M., & Frank, R. (2022). Differentiating Online Posting Behaviors of Violent and Nonviolent Right-Wing Extremists. Criminal Justice Policy Review, 33(9), 943–965. https://doi.org/10.1177/08874034221095398
- Davies, G., Scrivens, R., Gaudette, T., Frank, R. (2022). They’re Not All the Same: A Longitudinal Comparison of Violent and Non-Violent Right-Wing Extremist Identities Online. In: Perry, B., Gruenewald, J., Scrivens, R. (eds) Right-Wing Extremism in Canada and the United States . Palgrave Hate Studies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-99804-2_10
- Padda, K., Strange, S. M., Cartwright, B., & Frank, R. (2022). COVID-19 MISINFORMATION ON SOCIAL MEDIA: ETHICAL QUESTIONS OF RESEARCH AND REGULATION IN THE CANADIAN CONTEXT. The COVID-19 Pandemic: Ethical Challenges and Considerations, 49.
- Westlake, B., Brewer, R., Swearingen, T., Ross, A., Patterson, S., Michalski, D., Hole, M., Logos, K., Frank, R., Bright, D., & Afana, E. (2022). Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. Trends and Issues in Crime and Criminal Justice, 648, 1–15.
- Scrivens, R., Davies, G., Gaudette, T., & Frank, R. (2022). Comparing Online Posting Typologies among Violent and Nonviolent Right-Wing Extremists. Studies in Conflict and Terrorism, ahead-of-print(ahead-of-print), 1–23. https://doi.org/10.1080/1057610X.2022.2099269
- Cartwright, B., Frank, R., Weir, G., & Padda, K. (2022) Detecting and responding to hostile disinformation activities on social media using machine learning and deep neural networks. Neural Comput & Applic 34, 15141–15163 (2022). https://doi.org/10.1007/s00521-022-07296-0
- Zhang, Y., Frank, R., Warkentin, N., & Zakimi, N. (2022). Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure. Journal of Cybersecurity (Oxford), 8(1). https://doi.org/10.1093/cybsec/tyac003
- Helm, B., Scrivens, R., Holt, T. J., Chermak, S., & Frank, R. (2022). Examining incel subculture on Reddit. Journal of Crime & Justice, ahead-of-print(ahead-of-print), 1–19. https://doi.org/10.1080/0735648X.2022.2074867
- Nazarko, G., Frank, R., & Westerlund, M. (2021). Topic Modeling of StormFront Forum Posts. Cognitive 2021.
- Cartwright, B, Weir, G. R. S., Nahar, L., Padda, K. and Frank, R. (2019). The weaponization of Cloud-based social media: Prospects for legislation and regulation. Tenth International Conference on Cloud Computing, GRIDS, and Virtualization, May 2019, 7-11.
- Cartwright, B, Weir, G. R. S., and Frank, R. (2019). Fighting disinformation warfare with artificial intelligence: Identifying and combating disinformation attacks. Tenth International Conference on Cloud Computing, GRIDS, and Virtualization, May 2019, 67-72.
- Cartwright, B., Weir, G. R. S., and Frank, R. (2019). Cyberterrorism in the Cloud: Through a glass darkly. In Chen, L., Takabi, H. and Le, N. A (Eds.) Security, Privacy, and Digital Forensics in the Cloud. Hoboken NJ: John Wiley & Sons, 217-237.
- Cartwright, B. (2017). Cyberbullying and “The Law of the Horse”: A Canadian viewpoint. Journal of Internet Law, 20(10), 14–26.
- Cartwright, B. and Weir, G. R. S., and Lau, L. (Eds). (2016). Proceedings of the International Conference on Cybercrime and Computer Forensics, Vancouver, Canada, June 2016. IEEE Xplore Digital Library.
- Weir, G. R. S., Frank, R., Cartwright, B., and Dos Santos, E. (2016). Positing the problem: Enhancing classification of web content through textual analysis. International Conference on Cybercrime and Computer Forensics, Vancouver, Canada, June 2016, published in IEEE Xplore Digital Library.
- Cartwright, Barry. (2016). Cyberbullying and cyber law: A Canadian perspective. International Conference on Cybercrime and Computer Forensics, Vancouver, Canada, published in IEEE Xplore Digital Library.
- Cartwright, B. (2016). Ethical, legal and methodological considerations in cyber research: Conducting a cyberethnography of www.bullying.org. In Smith, R., Cheung, R. and Lau, L. (Eds.), Cybercrime risks and responses: Eastern and Western perspectives. London: Palgrave MacMillan, 35-46.
- Mikhaylov, A., & Frank, R. (2016). Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes. In Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC).
- Frank, R., Macdonald, M., & Monk, B. (2016). Location, Location, Location: Mapping Potential Canadian Targets in Online Hacker Discussion Forums. In Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC).
- Scrivens, R., & Frank, R. (2016). Sentiment-based Classification of Radical Text on the Web. In Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC).
- Davies, G., Neudecker, C., Ouellet, M., Bouchard, M., & Ducol, B. (2016). Toward a Framework to Assess Online Programs for Countering Violent Extremism. Journal for Deradicalization, 6, 51-86.
- Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor. Computational Models of Complex Systems, Intelligent Systems Reference Library, 53,171-184
- Westlake, B., Bouchard, M., & Frank, R. (2012). Comparing Methods for Detecting Child Exploitation Content Online. In Proceedings of the 2012 European Intelligence and Security Informatics Conference (EISIC).
- Westlake, B., Bouchard, M., & Frank, R. (2011). Finding the Key Players in Online Child Exploitation Networks. Policy & Internet, 3, 1-32.
- Basamanowicz, J., & Bouchard, M. (2011). Overcoming the Warez Paradox: Situational Crime Prevention and Warez Scene Piracy. Policy & Internet, 3, 1-25.
- Joffres, K., Bouchard, M., Frank, R. & Westlake, B. (2011) Strategies to Disrupt Online Child Pornography Networks. In Proceedings of the 2011 European Intelligence and Security Informatics Conference (EISIC).
*This presentation has received the Honorable Mention Award.
- Frank, R., Westlake, B., & Bouchard, M. (2010). The Structure and Content of Online Child Exploitation Networks. In Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (KDD).
Other Publications:
- Bouchard, M. (2013). Merging Computing and Crime Science: The Development of a Web-Crawling Tool to Investigate Cybercrime. Translational Criminology, 5, 5-17.
- Bouchard, M. (2013). Uncovering the Structure of Online Exploitation Networks. The Policy and Internet Blog. Oxford Internet Institute, University of Oxford.
- Frank, R., Cheng, C. & Pun, V. (2011). Social Media Sites: New Fora for Criminal, Communication and Investigation Opportunities. Public Safety Canada, RDIMS 434480.
Presentations:
- Barry Cartwright (with Richard Frank). Keynote Speaker. May 2020. Cyber-Attacks on Canadian Businesses: The Sum of All Fears, or Much Ado About Nothing? Meeting of the Canadian Mortgage Brokers’ Association.
- Barry Cartwright. August 2019. Keynote speaker, International Perspectives on Cybercrime Symposium, University, of Strathclyde, Glasgow, Scotland. Title of speech: “Disinformation Warfare and the Weaponization of Social Media.”
- Barry Cartwright. May 2019. Title of presentation: Fake News and the Weaponization of Cloud-based Social Media: Prospects for Legislation and Regulation. Tenth International Conference on Cloud Computing, GRIDS, and Virtualization, Venice, Italy.
- Barry Cartwright. May 2019. Title of presentation: Fighting disinformation warfare with artificial intelligence: Identifying and combating disinformation attacks. Tenth International Conference on Cloud Computing, GRIDS, and Virtualization, Venice, Italy.
- Barry Cartwright. August 2017. Keynote speaker, International Perspectives on Cybercrime Symposium, University, of Strathclyde, Glasgow, Scotland. Title of speech: “Cyber Terrorism and Cyber Warfare: A Clear and Present Danger, the Sum of All Fears, or Much To Do About Nothing?”
- Barry Cartwright. May 2017. Keynote speaker, Third Annual Symposium on Cyber Security and Digital Forensics, Kwantlen Polytechnic University, Richmond, B.C. Title of speech: “Cyberbullying and ‘The Law of the Horse’: A Canadian Perspective.”
- Barry Cartwright. June 2016. Cyberbullying and cyber law: A Canadian perspective. International Conference on Cybercrime and Computer Forensics, Vancouver, Canada.
- Barry Cartwright. June 2014. Keynote speaker, conference on “Cybercrime, Security and Digital Forensics,” University, of Strathclyde, Glasgow, Scotland. Title of speech: “The Battle-Line between ‘Cyber Libertarians’ and ‘Cyber Cops’: The Changing Face of Canadian Cyber Law.”
- Barry Cartwright. August 2013. International Conference on CyberCrime and Computer Forensics, Hong Kong. Title of presentation: “Ethical, Legal and Methodological Considerations in Cyber Research: Conducting a Cyberethnography of www.bullying.org.”
- Barry Cartwright. October, 2011. Keynote Speaker, Tri-City Joint Family Court & Youth Justice Committee learning series, at Coquitlam Campus of Douglas College. Title of speech: “Cyber-bullying: Not Just a School Problem.”
- Barry Cartwright. February, 2011. Western Society of Criminology conference, Vancouver, British Columbia. Title of presentation: “Conducting Cyber-Research on Bullying: A Qualitative, Textual Analysis of www.bullying.org.”
- Barry Cartwright. February 2007. Western Society of Criminology conference, Scottsdale, Arizona. Title of presentation: “Internet Research and Canadian Copyright Law: Privacy, Publicity, Private Property and Power.”
- Cartwright, B. E. (2011, February). Conducting Cyber-Research on Bullying: A Qualitative, Textual Analysis of www.bullying.org. Presented at the 2011 Western Society of Criminology Conference.
- Frank, R., & Westlake, B. (2011, May). Determining Key Players in Online Child Exploitation Networks. Presented at SFU Surrey Open House, Faculty of Arts & Social Sciences (Criminology).
- Frank, R., Westlake, B., & Bouchard, M. (2011, February). Extracting Dark Cyber Networks. Presented at the 2011 Western Society of Criminology Conference.